> MAC Address Based Security Technical Configuration Guide. Ethernet Routing Switch

Size: px
Start display at page:

Download "> MAC Address Based Security Technical Configuration Guide. Ethernet Routing Switch"

Transcription

1 Ethernet Routing Switch ERS 2500 ERS 3500 ERS 4500/ 4800 ERS 5500/ 5600 Virtual Services Platform VSP 7000 Engineering > MAC Address Based Security Technical Configuration Guide Avaya Data Solutions Document Date: July 2012 Document Number: NN Document Version: 2.1

2 2012 Avaya Inc. All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document is complete and accurate at the time of printing, Avaya assumes no liability for any errors. Avaya reserves the right to make changes and corrections to the information in this document without the obligation to notify any person or organization of such changes. Documentation disclaimer Avaya shall not be responsible for any modifications, additions, or deletions to the original published version of this documentation unless such modifications, additions, or deletions were performed by Avaya. End User agree to indemnify and hold harmless Avaya, Avaya s agents, servants and employees against all claims, lawsuits, demands and judgments arising out of, or in connection with, subsequent modifications, additions or deletions to this documentation, to the extent made by End User. Link disclaimer Avaya is not responsible for the contents or reliability of any linked Web sites referenced within this site or documentation(s) provided by Avaya. Avaya is not responsible for the accuracy of any information, statement or content provided on these sites and does not necessarily endorse the products, services, or information described or offered within them. Avaya does not guarantee that these links will work all the time and has no control over the availability of the linked pages. Warranty Avaya provides a limited warranty on this product. Refer to your sales agreement to establish the terms of the limited warranty. In addition, Avaya s standard warranty language, as well as information regarding support for this product, while under warranty, is available to Avaya customers and other parties through the Avaya Support Web site: Please note that if you acquired the product from an authorized reseller, the warranty is provided to you by said reseller and not by Avaya. Licenses THE SOFTWARE LICENSE TERMS AVAILABLE ON THE AVAYA WEBSITE, ARE APPLICABLE TO ANYONE WHO DOWNLOADS, USES AND/OR INSTALLS AVAYA SOFTWARE, PURCHASED FROM AVAYA INC., ANY AVAYA AFFILIATE, OR AN AUTHORIZED AVAYA RESELLER (AS APPLICABLE) UNDER A COMMERCIAL AGREEMENT WITH AVAYA OR AN AUTHORIZED AVAYA RESELLER. UNLESS OTHERWISE AGREED TO BY AVAYA IN WRITING, AVAYA DOES NOT EXTEND THIS LICENSE IF THE SOFTWARE WAS OBTAINED FROM ANYONE OTHER THAN AVAYA, AN AVAYA AFFILIATE OR AN AVAYA AUTHORIZED RESELLER, AND AVAYA RESERVES THE RIGHT TO TAKE LEGAL ACTION AGAINST YOU AND ANYONE ELSE USING OR SELLING THE SOFTWARE WITHOUT A LICENSE. BY INSTALLING, DOWNLOADING OR USING THE SOFTWARE, OR AUTHORIZING OTHERS TO DO SO, YOU, ON BEHALF OF YOURSELF AND THE ENTITY FOR WHOM YOU ARE INSTALLING, DOWNLOADING OR USING THE SOFTWARE (HEREINAFTER REFERRED TO INTERCHANGEABLY AS "YOU" AND "END USER"), AGREE TO THESE TERMS AND CONDITIONS AND CREATE A BINDING CONTRACT BETWEEN YOU AND AVAYA INC. OR THE APPLICABLE AVAYA AFFILIATE ("AVAYA"). Copyright Except where expressly stated otherwise, no use should be made of the Documentation(s) and Product(s) provided by Avaya. All content in this documentation(s) and the product(s) provided by Avaya including the selection, arrangement and design of the content is owned either by Avaya or its licensors and is protected by copyright and other intellectual property laws including the sui generis rights relating to the protection of databases. You may not modify, copy, reproduce, republish, upload, post, transmit or distribute in any way any content, in whole or in part, including any code and software. Unauthorized reproduction, transmission, dissemination, storage, and or use without the express written consent of Avaya can be a criminal, as well as a civil offense under the applicable law. Third Party Components Certain software programs or portions thereof included in the Product may contain software distributed under third party agreements ("Third Party Components"), which may contain terms that expand or limit rights to use certain portions of the Product ("Third Party Terms"). Information regarding distributed Linux OS source code (for those Products that have distributed the Linux OS source code), and identifying the copyright holders of the Third Party Components and the Third Party Terms that apply to them is available on the Avaya Support Web site: Trademarks The trademarks, logos and service marks ("Marks") displayed in this site, the documentation(s) and product(s) provided by Avaya are the registered or unregistered Marks of Avaya, its affiliates, or other third parties. Users are not permitted to use such Marks without prior written consent from Avaya or such third party which may own the Mark. Nothing contained in this site, the documentation(s) and product(s) should be construed as granting, by implication, estoppel, or otherwise, any license or right in and to the Marks without the express written permission of Avaya or the applicable third party. Avaya is a registered trademark of Avaya Inc. All non-avaya trademarks are the property of their respective owners. Downloading documents For the most current versions of documentation, see the Avaya Support. Web site: Contact Avaya Support Avaya provides a telephone number for you to use to report problems or to ask questions about your product. The support telephone number is in the United States. For additional support telephone numbers, see the Avaya Web site: 2

3 Abstract Revision Control No Date Version Revised By Remarks 1 1 Aug V. Ganjian Initial draft document release 2 22 Nov K. Marshall Rebranded Avaya 3 September L. Stevens Complete re-write 4 24 Sept L. Stevens Incorporated review changes from JVE 3

4 Table of Contents Figures... 5 Tables Introduction Base configuration setup Ensuring MAC Security can never accidentally be enabled on uplinks Disabling SNMP write access just for MAC Security configuration Regular MAC Security examples Controlling exactly which MAC is allowed to use each and every access port Ensuring that no new unauthorized device (MAC) is added to the network Using MAC Security to tie down Server MACs using Active/Standby NICs Achieving MAC based VLANs using MAC Security Auto-Learning with MaxMacs example Ensuring that every access port is used by one and only one device Auto-Learning with Sticky-MAC example MAC Security without having to pre-provision ports when new devices added

5 Figures Figure 1: Base setup Figure 2: Regular MAC Security; example Figure 3: Example 1; unauthorized MAC on non-provisioned port Figure 4: Example 1; unauthorized MAC on provisioned port Figure 5: Example 1; unauthorized MAC sharing connection with authorized MAC Figure 6: Example 1; unauthorized MAC moving to a different port Figure 7: Regular MAC Security; example Figure 8: Example 2; a new device is added to the network Figure 9: MAC-Security with Active-Standby NICs; example Figure 10: Example 3; servers switch over to Backup NIC Figure 11: Example 3; unauthorized device takes server Standby NIC connection Figure 12: VLAN based MAC-Security; example Figure 13: Example 4; unauthorized MAC Figure 14: Example 4; authorized MACs in wrong VLAN Figure 15: Auto-Learning with MaxMacs; example Figure 16: Example 5; an unauthorized hub/switch is connected to the network Figure 17: Example 5; an unauthorized WLAN AP is connected to the network Figure 18: MAC Security without any provisioning of new devices; example Figure 19: Example 6; a new device is added to the network Figure 20: Example 6; unauthorized MAC on provisioned port Figure 21: Example 6; unauthorized MAC sharing connection with authorized MAC Figure 22: Example 6; unauthorized MAC moving to a different port Tables Table 1: MAC Security support across Avaya switch family types... 7 Table 2: MAC Security capability vs. mode matrix Table 3: MAC Security config commands vs. mode matrix

6 Conventions This section describes the text, image, and command conventions used in this document. Symbols Tip Highlights a configuration or technical tip. Note Highlights important information to the reader. Warning Highlights important information about an action that may result in equipment damage, configuration or data loss. Text Bold text indicates emphasis. Italic text in a Courier New font indicates text the user must enter or select in a menu item, button or command: ERS T# show running-config Output examples from Avaya devices are displayed in a Lucida Console font: ERS T# show sys-info Operation Mode: Switch MAC Address: B0-00 PoE Module FW: Reset Count: 83 Last Reset Type: Management Factory Reset Power Status: Primary Power Autotopology: Enabled Pluggable Port 45: None Pluggable Port 46: None Pluggable Port 47: None Pluggable Port 48: None Base Unit Selection: Non-base unit using rear-panel switch sysdescr: Ethernet Routing Switch T-PWR HW:02 FW: SW:v Mfg Date: HW Dev:H/W rev.02 6

7 1. Introduction The MAC Security feature offers a number of different ways to restrict access to the network based on the sender s MAC address as well as the number of source MACs seen on the ethernet access port. The ERS stackables MAC Security feature dates back from the Baystack BaySecure which originally supported the basic static MAC security mode as well as an Auto-Learning mode which was later enhanced with the addition of a Sticky MAC support. The following list provides a breakdown per switch family in terms of additional MAC Security components and starting from which software version they first became available: ERS SW MAC Security Static & Auto-Learning SW MAC Security port lock-out enhancement SW MAC Security Auto-Learning Sticky MAC Address ERS SW MAC Security Static & Auto-Learning SW MAC Security Auto-Learning Sticky MAC Address SW MAC Security Auto-Learning Sticky MAC Address ERS SW MAC Security Static & Auto-Learning & Sticky MAC Address ERS SW MAC Security Static SW MAC Security Auto-Learning SW MAC Security Auto-Learning Sticky MAC Address VSP SW MAC Security Static & Auto-Learning & Sticky MAC Address SW MAC Security port lock-out enhancement Table 1: MAC Security support across Avaya switch family types This document will focus on the full capabilities of the MAC Security feature regardless of stackable switch family type (i.e. assuming a software release greater or equal to the last one shown in the list above). First and foremost it is necessary to clarify the various modes and options available. There are essentially three useful ways to use the MAC Security feature: 1. Regular MAC Security where a list of allowed MAC addresses is configured against either individual ethernet ports or security lists (which constitute a set of ethernet ports). There is no limit to how many MACs can be assigned to a given port, the only limit being that a maximum of 448 MAC can be configured in the MAC Security MAC table. If a packet is then received on a MAC Security enabled port with a source MAC address which is not in the list of allowed MAC addresses for that port (or security list) this will trigger a violation and the packet will be discarded. The list of authorized MAC addresses can be manually configured and/or updated at any time. It is also possible to populate the authorized MAC addresses list for a given port by temporarily suspending MAC Security and activating the Learning mode on selected ports for one-shot learning. However, currently there is no way to leverage Learning against Security-Lists. Either way, when a new ethernet access port is to be used, populating the allowed MACs for that 7

8 port will require intervention by the network administrator. 2. Auto-Learning with MaxMacs where the switch allows learned MAC addresses up to a specified maximum enforced on the ports with MAC Security enabled. This mode works by permanently enabling the Auto-Learning functionality on the ethernet ports and automatically recording every new MAC address seen on the port. If a new MAC address is seen on the port and the number of authorized MAC addresses on the port was already reached this will trigger a violation and the packet arriving with the new MAC address will be discarded. The number of allowed MAC addresses which can be defined on the ethernet ports can be set to a value ranging between 1 and 25. Note that this mode does not authorize any particular MAC address, it simply ensures connectivity for the 1 st X (where X = 1..25) MAC addresses learnt on the port. Also note that the list of recorded MAC addresses is a dynamic list which means entries can age out and do get cleared against ports which are bounced (cable disconnected and re-connected) as well as flushed when the switch is rebooted (MAC addresses learnt by Auto-Learning are not saved to the config file). Hence if the switch is rebooted or ports are bounced, it is likely that a different set of MAC addresses will be allowed on the port depending on the order in which these get learnt. In summary, this mode may or may not be applicable depending on if you wish to allow or not allow new MACs on a port upon a reboot or port bounce. In this mode a device can easily move ports as its MAC address will automatically get re-learnt on the new port by the Auto-Learning mode (just as happens for the regular MAC table / FDB). 3. Auto-Learning with Sticky-Mac which is just like the previous flavor, in that Auto-Learning and a maximum number of allowed MACs are configured on the ethernet ports, except that now once a MAC address is seen it is made sticky to the port where it was seen and automatically saved to the config file. Like the previous mode, if a new MAC address is seen on the port and the number of authorized MAC addresses on the port was already reached this will trigger a violation and the packet arriving with the new MAC address will be discarded. Unlike the previous mode, there is no aging of the Sticky-MACs and once the number of allowed MACs has been learnt on a port, those MAC addresses will be the only MAC addresses allowed on that port even if the port is bounced or the switch is restarted. Also, unlike the previous mode, devices cannot move from one ethernet port to another. In summary, the MAC is locked to the original port and an intrusion event will be generated if the same MAC appears on another port. If the network administrator wished the MAC address to be moved to another port, the address must be deleted from the original port location.. So this mode is essentially similar to the regular MAC Security mode in that it only allows access to certain MAC addresses on the MAC Security enabled ports. It diverges from that mode in two ways: a. No initial provisioning is required when a new access port is to be used; the allowed MACs will be Auto-Learned as the 1 st device(s) is/are attached b. It is not possible to use Security-Lists in this mode In all 3 modes above, the packets with an offending source MAC will be discarded and will trigger a violation. Upon a violation it is possible to define additional security actions. These can be specified as any combination of the following actions: No additional action Generate a Trap Partition the Port 8

9 Under EDM these options are globally specified as follows: Note DA-Filtering is an additional MAC Security functionality which, once enabled, is permanent to all MAC Security enabled ports (i.e. it does not only apply when a violation is triggered as could be implied from the EDM Security Action configuration dialog above). With DA-Filtering it is possible to specify a list of up to 10 MAC addresses to which packets originating from a MAC Security port are not allowed to send traffic to. The offending traffic is simply dropped without triggering any violation. This feature is historic and there is no useful application for this capability in its present form, hence this is not covered any further in this document. It should be noted that while an unauthorized device will never be allowed to send traffic into the network (as its source MAC is blocked) the device can still receive traffic from the network which means the unauthorized device is able to see broadcast and unknown traffic within the VLAN it is connected to. If this is deemed to be unsecure, then the port should be partitioned by setting the corresponding Security Action. The following table tries to summarize the distinctive characteristics of each of the above 3 modes. Feature Mode Regular MAC Security Auto-Learning with MaxMacs Auto-Learning with Sticky-Mac Ability to authorize only manually configured MACs Ability to assign authorized MACs to Security lists instead of ports Yes No No Yes No No Ability to authorize only 1 MAC per port Yes Yes (with MacMACs = 1; but cannot control what that MAC will be) Yes (with MacMACs = 1) Ability to authorize only 1 MAC across 2 or more ports Yes (using Securitylists) No, any single MAC will be allowed to move ports No Ability to authorize more than 1 MAC per port Yes (unlimited) Yes (25 Max; but cannot control what those MACs will be) Yes (25 max) Discard packets from unauthorized device/mac Yes Yes Yes Prevent unauthorized device from receiving VLAN traffic Yes (with Security Action set to Partition) Yes (with Security Action set to Partition) Yes (with Security Action set to Partition) Limit the number of devices allowed to use an ethernet No Yes No 9

10 port (regardless of their MAC address) Ability to alert/shutdown a port when more than X MAC addresses are learnt on the port No Yes (using trap/partition Security- Action) Yes (using trap/partition Security- Action) Ability to generate an alert (Log message + Trap) upon a security violation Ability to partition the port upon a security violation Yes Yes Yes Yes Yes Yes Ability to learn authorized MACs during controlled oneshot learning Yes (but not with Security-lists) No No Ability to limit the number of authorized MACs on a port Yes (implied by the number of MACs added to the port s authorized list) Yes (by setting MaxMac) Yes (by setting MaxMac) Intervention required when a new access port is used Yes (authorized MACs for the port need to be added or Learned; or port needs to be added to an existing security-list) No No (authorized MACs will be automatically learned) A MAC can be authorized to move across any MAC Security enabled port No Yes No A MAC can be authorized to move across a specified range of MAC Security enabled ports Yes (using a Security- List) No No List of authorized MACs is saved to config and preserved upon switch restart Yes No Yes Table 2: MAC Security capability vs. mode matrix 10

11 The table below attempts to clarify which CLI commands are relevant to each of the above modes. Commands which are not listed for a given mode are not to be used for that mode. Mode / Context Global config commands Interface config commands Common to all 3 modes Regular MAC Security Auto-Learning with MaxMacs Auto-Learning with Sticky-Mac mac-security enable disable [no] mac-security snmp-trap mac-security intrusion-detect forever enable disable mac-security intrusion-timer < > mac-security snmp-lock enable disable [no] mac-security security-list <list> <ports> mac-security mac-address-table address <MAC> port <port> mac-security mac-address-table address <MAC> security-list <list> mac-security learning enable disable mac-security learning-ports <ports> [no] mac-security auto-learning sticky mac-security mac-address-table stickyaddress <MAC> port <port> mac-security enable disable [no] mac-security lock-out [no] mac-security learning mac-security auto-learning enable disable max-addrs <X> mac-security auto-learning enable disable max-addrs <X> Table 3: MAC Security config commands vs. mode matrix This document will use some real life examples where each of the above modes can be used. Note that another option for authenticating devices by MAC address is Non-EAP (NEAP) authentication whereby source MAC addresses are authenticated against a centralized RADIUS Server. NEAP was designed for network environments where 802.1X EAP is deployed for network access control in order to allow non-eap devices, such as a printer or security camera which lacked the 802.1X supplicant. Although not explored as part of this configuration guide, NEAP is another option for authenticating connecting devices based on MAC Address. 11

12 2. Base configuration setup All the examples covered use the same base configuration setup shown in the following figure. Figure 1: Base setup For simplicity the Avaya ERS Switch is configured as a simple access layer 2 switch with no IP routing. A separate IP router acts as default gateway for the end stations. However the same configuration examples covered in this document would also work in configurations where the Avaya ERS Switch is acting as an IP router. End stations communicate over VLAN 30, or VLAN 40, which are port based VLANs configured across access ports as well as the uplinks towards the distribution layer IP router acting as default gateway for the end stations. Note that the Avaya ERS switch does not have any IP address on VLAN 30 or VLAN 40. The management IP address of the Avaya ERS Switch would be on a separate management VLAN only present on the uplink towards the distribution layer router (VLAN 47 on this setup, not shown in diagram). Base configuration for Avaya ERS Switch for VLAN 30 and access ports snmp-server enable snmp-server name "Avaya-ERS-Switch" ip default-gateway ip address switch ip address netmask vlan create 30,40,47 type port 1 vlan ports tagging tagall vlan configcontrol flexible vlan members 1 NONE vlan members ,23-24 vlan members ,23-24 vlan members vlan ports 1-10 pvid 30 vlan ports pvid 40 12

13 vlan ports pvid 47 vlan configcontrol automatic mlt 1 name "Trunk #1" enable member interface FastEthernet ALL spanning-tree port 1-20 learning fast spanning-tree port learning disable exit vlan mgmt 47 mlt spanning-tree 1 stp 1 learning disable 2.1 Ensuring MAC Security can never accidentally be enabled on uplinks The MAC Security feature is only intended as a feature to enable on access ports. Accidentally enabling the feature on the edge switch uplinks can have serious consequences which might end up rendering the edge switch isolated from the rest of the network. To prevent this from happening, the ERS5000 and VSP7000 have a MAC Security port lock-out feature which can be enabled on the switch uplink ports so that they will never enable or accept any MAC Security related configuration. In our setup we would enable port lock-out on our MLT uplink ports 23& Using ACLI Enable Port lock-out for MLT uplink ports Avaya-ERS-Switch(config)# interface FastEthernet Avaya-ERS-Switch(config-if)# mac-security lock-out Avaya-ERS-Switch(config-if)# exit Checking Port lock-out for MLT uplink ports Avaya-ERS-Switch# show mac-security port Port Trunk Security Auto-Learning MAC Number Security Locked-out Disabled Disabled 2 Enabled 24 Disabled Disabled 2 Enabled 13

14 2.1.2 Using EDM Enable Port lock-out for MLT uplink ports

15 Checking Port lock-out for MLT uplink ports Disabling SNMP write access just for MAC Security configuration This document covers both ACLI and EDM for configuring each of the examples covered in the sections to come. However, in some environments it may be desirable to only allow control of the MAC Security feature from the ACLI of the switch. To achieve this, MAC Security has the capability to apply an SNMPlock to the feature. Disable all SNMP write access to the MAC Security functionality Avaya-ERS-Switch(config)# mac-security snmp-lock enable Now it will no longer be possible to modify MAC-Security from EDM (via COM); any attempt to do so will result in an error; however the MAC Security configuration can still be viewed from COM. 15

16 An attempt to now modify the MAC Security config via COM However, in the case of EDM web-access directly to the switch IP address, it is still possible to modify the MAC Security configuration. Web access on the switch would in any case need to be disabled for security reasons. Disable web access (HTTP & HTTPS) to the switch (EDM on-box) Avaya-ERS-Switch(config)# web-server disable 16

17 3. Regular MAC Security examples 3.1 Controlling exactly which MAC is allowed to use each and every access port In this example, typically favored by the military, every access port is manually configured to allow 1 and only 1 device (and hence MAC address). Before a new device can be added to the network the network administrator must manually add the new MAC address to its allocated access ethernet port s authorized MAC list. In the event of a non-authorized MAC address attempting to send traffic into the network a trap will be sent to the management station and the unauthorized device will not be allowed to send traffic into the network Using ACLI Initial Switch configuration Globally enable MAC Security Figure 2: Regular MAC Security; example 1 Avaya-ERS-Switch(config)# mac-security enable Enable MAC Security on the access ports Avaya-ERS-Switch(config)# interface FastEthernet 1-20 Avaya-ERS-Switch(config-if)# mac-security enable Avaya-ERS-Switch(config-if)# exit On older software versions you can enable traps upon violation; in more recent software versions the traps are automatically generated and this command no longer exists Avaya-ERS-Switch(config)# mac-security snmp-trap Provisioning authorized users 17

18 Assign authorized MACs to respective access ports Avaya-ERS-Switch(config)# mac-security mac-address-table address 00-0F-B5-08-2F-BB port 1 Avaya-ERS-Switch(config)# mac-security mac-address-table address 00-0F-B F port 2 Avaya-ERS-Switch(config)# mac-security mac-address-table address 00-C0-95-C8-FF-12 port 3 Avaya-ERS-Switch(config)# mac-security mac-address-table address 00-C0-95-C8-9A-62 port Checking MAC Security operational status Verify that MAC Security is globally enabled Avaya-ERS-Switch# show mac-security config MAC Address Security: Enabled MAC Address Security SNMP-Locked: Disabled Partition Port on Intrusion Detected: Disabled DA Filtering on Intrusion Detected: Disabled MAC Auto-Learning Age-Time: 60 minutes MAC Auto-Learning Sticky Mode: Disabled Current Learning Mode: Disabled Learn by Ports: NONE Verify that MAC Security is enabled on the access ports Avaya-ERS-Switch# show mac-security port Port Trunk Security Auto-Learning MAC Number Enabled Disabled 2 2 Enabled Disabled 2 3 Enabled Disabled 2 4 Enabled Disabled 2 5 Enabled Disabled 2 6 Enabled Disabled 2 7 Enabled Disabled 2 8 Enabled Disabled 2 9 Enabled Disabled 2 10 Enabled Disabled 2 11 Enabled Disabled 2 12 Enabled Disabled 2 13 Enabled Disabled 2 18

19 14 Enabled Disabled 2 15 Enabled Disabled 2 16 Enabled Disabled 2 17 Enabled Disabled 2 18 Enabled Disabled 2 19 Enabled Disabled 2 20 Enabled Disabled 2 21 Disabled Disabled 2 22 Disabled Disabled Disabled Disabled Disabled Disabled 2 Verify the authorized MAC addresses appear in the MAC Security MAC table Avaya-ERS-Switch# show mac-security mac-address-table Number of addresses: 4 Unit Port Allowed MAC Address Type F-B5-08-2F-BB Static F-B F Static C0-95-C8-FF-12 Static C0-95-C8-9A-62 Static Security List Allowed MAC Address Type Verify the FDB on the switch Avaya-ERS-Switch# show mac-address-table vid 30 Mac Address Table Aging Time: 300 Learning Enabled Ports 1-26 Number of addresses: 5 MAC Address Vid Type Source F-B5-08-2F-BB 30 Dynamic Port: F-B F 30 Dynamic Port: 2 19

20 00-C0-95-C8-9A Dynamic Port: 4 00-C0-95-C8-FF Dynamic Port: 3 00-E E Dynamic Trunk: Using EDM Initial Switch configuration Globally enable MAC Security 20

21 Enable MAC Security on the access ports Enable traps upon violation 21

22 Provisioning authorized users Assign authorized MACs to respective access ports 22

23 23

24 Checking MAC Security operational status Verify that MAC Security is globally enabled and on access ports 24

25 Verify the authorized MAC addresses appear in the MAC Security MAC table Verify ports 1-4 are authenticated with the correct MAC address Verifying user connectivity Verify IP connectivity between the Router and the end stations Router#% ping ; ping ; ping ; ping is alive is alive is alive is alive 25

26 3.1.4 Testing violations Unauthorized MAC on non-provisioned port Figure 3: Example 1; unauthorized MAC on non-provisioned port The unauthorized device is not able to send any traffic into the network; however it is still able to see broadcast and unknown traffic flowing in the VLAN; if this is undesired the MAC Security should be configured to partition the port upon an access violation. Verify log file on switch Avaya-ERS-Switch# show log Type Time Idx Src Message I 00:05:53:48 1 Link Up Trap for Port: 5 I 00:05:53:52 2 Bay Secure intruder MAC 00-e0-4c port 5 I 00:05:53:52 3 Trap: s5etrnewsbsmacaccessviolation 26

27 Verify traps on Management station (e.g. VPFM or COM) Verify MAC Security violations from EDM 27

28 Unauthorized MAC on provisioned port Figure 4: Example 1; unauthorized MAC on provisioned port The unauthorized device is not able to send any traffic into the network; however it is still able to see broadcast and unknown traffic flowing in the VLAN; if this is undesired the MAC Security should be configured to partition the port upon an access violation. Verify log file on switch Avaya-ERS-Switch# show log Type Time Idx Src Message I 00:06:12:15 1 Link Down Trap for Port: 1 I 00:06:12:17 2 Link Up Trap for Port: 1 I 00:06:12:21 3 Bay Secure intruder MAC 00-e0-4c port 1 I 00:06:12:21 4 Trap: s5etrnewsbsmacaccessviolation 28

29 Verify traps on Management station (e.g. VPFM or COM) Verify MAC Security violations from EDM 29

30 Unauthorized MAC sharing connection with authorized MAC Figure 5: Example 1; unauthorized MAC sharing connection with authorized MAC The unauthorized device is not able to send any traffic into the network but station with IP can still talk to the network. However the unauthorized device is still able to see broadcast and unknown traffic flowing in the VLAN and, if a shared hub was inserted on the network connection, it can also see all of traffic sent and received by station with IP ; if this is undesired the MAC Security should be configured to partition the port upon an access violation. Verify log file on switch Avaya-ERS-Switch# show log Type Time Idx Src Message I 00:06:24:58 1 Link Down Trap for Port: 1 I 00:06:25:01 2 Link Up Trap for Port: 1 I 00:06:25:05 4 Bay Secure intruder MAC 00-e0-4c port 1 I 00:06:25:05 5 Trap: s5etrnewsbsmacaccessviolation 30

31 Verify traps on Management station (e.g. VPFM or COM) Verify MAC Security violations from EDM Note that the authorized device on port 1 retains connectivity, but the unauthorized laptop cannot talk to the network Router#% ping ; ping ; ping ; ping ; ping is alive is alive is alive is alive no answer from Tip If the network administrator prefers to disable the ethernet port 1 in this scenario, it is sufficient to configure port partitioning security action upon violation. 31

32 Authorized MAC moving to a different port Figure 6: Example 1; unauthorized MAC moving to a different port Neither of the two end stations with swapped connections can now talk to the network. Verify log file on switch Avaya-ERS-Switch# show log Type Time Idx Src Message I 00:06:37:42 1 Link Down Trap for Port: 1 I 00:06:37:43 2 Link Down Trap for Port: 2 I 00:06:37:46 3 Link Up Trap for Port: 1 I 00:06:37:49 4 Link Up Trap for Port: 2 I 00:06:37:53 5 Bay Secure intruder MAC 00-0f-b5-08-2f-bb port 2 I 00:06:37:53 6 Trap: s5etrnewsbsmacaccessviolation I 00:06:37:55 7 Bay Secure intruder MAC 00-0f-b f port 1 I 00:06:37:55 8 Trap: s5etrnewsbsmacaccessviolation 32

33 Verify traps on Management station (e.g. VPFM or COM) Verify MAC Security violations from EDM Note that the authorized devices cannot communicate on the wrong ethernet port Router#% ping ; ping ; ping ; ping no answer from no answer from is alive is alive 33

34 3.2 Ensuring that no new unauthorized device (MAC) is added to the network In this example the network administrator wants to start using MAC Security but does not have the time or will to manually configure every single MAC address which is already on his network. The assumption is made that existing MAC addresses on the network are allowed with the intention that once MAC Security has been enabled no further device (MAC) can be added to the network or moved to a different port without the knowledge and permission of the network administrator. Figure 7: Regular MAC Security; example Using ACLI Initial Switch configuration Globally enable MAC Security Avaya-ERS-Switch(config)# mac-security enable Enable learning on the access ports Avaya-ERS-Switch(config)# mac-security learning-ports 1-20 Avaya-ERS-Switch(config)# mac-security learning enable Note There is an alternative syntax for enabling learning on the port interfaces: Avaya-ERS-Switch(config)# interface FastEthernet 1-20 Avaya-ERS-Switch(config-if)# mac-security learning Avaya-ERS-Switch(config-if)# exit Verify that MAC Security learning mode is enabled Avaya-ERS-Switch#% show mac-security config MAC Address Security: Enabled MAC Address Security SNMP-Locked: Disabled 34

35 Partition Port on Intrusion Detected: Disabled DA Filtering on Intrusion Detected: Disabled MAC Auto-Learning Age-Time: 60 minutes MAC Auto-Learning Sticky Mode: Disabled Current Learning Mode: Enabled Learn by Ports: 1-20 Note Traffic will be unaffected during this time Now wait a couple of minutes to ensure that all MAC addresses on the switch have been recorded. View recorded MACs so far Avaya-ERS-Switch# show mac-security mac-address-table Number of addresses: 3 Unit Port Allowed MAC Address Type F-B5-08-2F-BB Static F-B F Static C0-95-C8-FF-12 Static Security List Allowed MAC Address Type Once satisfied that all MACs have been recorded, we can proceed to lock these down and activate MAC Security on the access ports. Disable MAC security learning mode Avaya-ERS-Switch(config)# mac-security learning disable Enable MAC Security on the access ports Avaya-ERS-Switch(config)# interface FastEthernet 1-20 Avaya-ERS-Switch(config-if)# mac-security enable Avaya-ERS-Switch(config-if)# exit 35

36 Checking MAC Security operational status Verify that MAC Security is globally enabled Avaya-ERS-Switch# show mac-security config MAC Address Security: Enabled MAC Address Security SNMP-Locked: Disabled Partition Port on Intrusion Detected: Disabled DA Filtering on Intrusion Detected: Disabled MAC Auto-Learning Age-Time: 60 minutes MAC Auto-Learning Sticky Mode: Disabled Current Learning Mode: Disabled Learn by Ports: NONE Verify that MAC Security is enabled on the access ports Avaya-ERS-Switch# show mac-security port Port Trunk Security Auto-Learning MAC Number Enabled Disabled 2 2 Enabled Disabled 2 3 Enabled Disabled 2 4 Enabled Disabled 2 5 Enabled Disabled 2 6 Enabled Disabled 2 7 Enabled Disabled 2 8 Enabled Disabled 2 9 Enabled Disabled 2 10 Enabled Disabled 2 11 Enabled Disabled 2 12 Enabled Disabled 2 13 Enabled Disabled 2 14 Enabled Disabled 2 15 Enabled Disabled 2 16 Enabled Disabled 2 17 Enabled Disabled 2 18 Enabled Disabled 2 19 Enabled Disabled 2 36

37 20 Enabled Disabled 2 21 Disabled Disabled 2 22 Disabled Disabled Disabled Disabled Disabled Disabled 2 Verify the authorized MAC addresses appear in the MAC Security MAC table Avaya-ERS-Switch# show mac-security mac-address-table Number of addresses: 3 Unit Port Allowed MAC Address Type F-B5-08-2F-BB Static F-B F Static C0-95-C8-FF-12 Static Security List Allowed MAC Address Type Verify the FDB on the switch Avaya-ERS-Switch# show mac-address-table vid 30 Mac Address Table Aging Time: 300 Learning Enabled Ports 1-26 Number of addresses: 4 MAC Address Vid Type Source F-B5-08-2F-BB 30 Dynamic Port: F-B F 30 Dynamic Port: 2 00-C0-95-C8-FF Dynamic Port: 3 00-E E Dynamic Trunk:1 37

38 3.2.2 Using EDM Initial Switch configuration Globally enable MAC Security Enable learning on the access ports 38

39 Now wait a couple of minutes to ensure that all MAC addresses on the switch have been recorded. Note Traffic will be unaffected during this time View recorded MACs so far Once satisfied that all MACs have been recorded, we can proceed to lock these down and activate MAC Security on the access ports. Disable MAC security learning mode 39

40 Note There is no need to clear the ports under PortLearnStatus; after reverting SecurityMode back to maclist all ports under PortLearnStatus will be cleared anyway Enable MAC Security on the access ports Enable traps upon violation 40

41 Checking MAC Security operational status Verify that MAC Security is globally enabled and on access ports Verify the authorized MAC addresses appear in the MAC Security MAC table 41

42 Verify used ports 1-3 are authenticated with the correct MAC address Verifying user connectivity & switch configuration Verify IP connectivity between the Router and the end stations Router#% ping ; ping ; ping is alive is alive is alive Verify the resulting switch config Avaya-ERS-Switch# show running-config! Embedded ASCII Configuration Generator Script! Model = Ethernet Routing Switch 4826GTS-PWR+! Software version = v !! Displaying only parameters different to default!================================================ enable configure terminal [...]!! *** MAC-Based Security ***! interface FastEthernet ALL mac-security port 1-20 enable 42

43 exit mac-security enable mac-security mac-address-table address 00.0f.b5.08.2f.bb port 1 mac-security mac-address-table address 00.0f.b f port 2 mac-security mac-address-table address 00.c0.95.c8.ff.12 port 3 [...] end Note The learned MAC addresses are now part of the config file for the switch and thus will be preserved over a switch reboot When a new device is added to the network Figure 8: Example 2; a new device is added to the network In the above diagram a new end station is added to the network on port 4. This will initially trigger a MAC Security violation. The network administrator will then have to take action to (a) verify whether the new end station should be allowed into the network and if so, (b) add the new end station s MAC to the authorized list on the relevant port. In this example, the network administrator does not like typing in MAC addresses so he will use the learning functionality to achieve the same. Verify log file on switch Avaya-ERS-Switch# show log Type Time Idx Src Message I 01:01:07:23 3 Link Up Trap for Port: 4 I 01:01:07:28 4 Bay Secure intruder MAC 00-c0-95-c8-9a-62 port 4 I 01:01:07:28 5 Trap: s5etrnewsbsmacaccessviolation 43

44 Verify traps on Management station (e.g. VPFM or COM) The network administrator decides to give access to the network to this new device Using ACLI Temporarily disable MAC security on port 4 Avaya-ERS-Switch(config)# interface FastEthernet 4 Avaya-ERS-Switch(config-if)# mac-security disable Avaya-ERS-Switch(config-if)# exit Enable learning on access port 4 Avaya-ERS-Switch(config)# mac-security learning-ports 4 Avaya-ERS-Switch(config)# mac-security learning enable Note This has no impact on MAC security or traffic forwarding on the other switch ports. Wait for the new MAC to be learnt on port 4 Avaya-ERS-Switch(config)# show mac-security mac-address-table Number of addresses: 4 Unit Port Allowed MAC Address Type F-B5-08-2F-BB Static F-B F Static C0-95-C8-FF-12 Static C0-95-C8-9A-62 Static 44

45 Security List Allowed MAC Address Type Warning Ensure that only 1 MAC address and the correct MAC address has been learnt against port 4. We can now proceed to re-enable MAC Security on port 4 Disable MAC Security learning mode Avaya-ERS-Switch(config)# mac-security learning disable Re-enable MAC security on port 4 Avaya-ERS-Switch(config)# interface FastEthernet 4 Avaya-ERS-Switch(config-if)# mac-security enable Avaya-ERS-Switch(config-if)# exit The new user is now securely added to the network Using EDM Temporarily disable MAC security on port 4 45

46 Enable learning on access port 4 Note This has no impact on MAC security or traffic forwarding on the other switch ports. Wait for the new MAC to be learnt on port 4 Warning Ensure that only 1 MAC address and the correct MAC address has been learnt against port 4. We can now proceed to re-enable MAC Security on port 4 46

47 Disable MAC Security learning mode Note There is no need to clear the ports under PortLearnStatus; after reverting SecurityMode back to maclist all ports under PortLearnStatus will be cleared anyway 47

48 Re-enable MAC security on port 4 The new user is now securely added to the network Checking connectivity Verify IP connectivity between the Router and the end stations Router#% ping is alive 48

49 3.3 Using MAC Security to tie down Server MACs using Active/Standby NICs In this example, again another military favorite, we want to use MAC Security in the Data Centre on the server aggregation switches but with the added challenge that the servers can be using dual NICs in Active/Standby fashion. Figure 9: MAC-Security with Active-Standby NICs; example 3 This means that the server MAC address will normally be seen on the ethernet port corresponding to the Active NIC but can move to an alternative ethernet port corresponding to the Standby NIC. In this example we will use Security Lists which will allow us to tie the authorized MAC addresses to a Security List instead of an ethernet port. The security list will then include the two ethernet ports where the server NICs are connected Using ACLI Initial Switch configuration Create the Security Lists (one for each server) Avaya-ERS-Switch(config)# mac-security security-list Avaya-ERS-Switch(config)# mac-security security-list Note Up to 32 Security Lists can be created. Globally enable MAC Security Avaya-ERS-Switch(config)# mac-security enable Enable MAC Security on the access ports Avaya-ERS-Switch(config)# interface FastEthernet 1-20 Avaya-ERS-Switch(config-if)# mac-security enable 49

50 Avaya-ERS-Switch(config-if)# exit Provisioning authorized servers Assign authorized MACs to respective security lists Avaya-ERS-Switch(config)# mac-security mac-address-table address 00-C0-95-C8-FF-12 security-list 1 Avaya-ERS-Switch(config)# mac-security mac-address-table address 00-C0-95-C8-9A-62 security-list Checking MAC Security operational status Verify that MAC Security is globally enabled Avaya-ERS-Switch# show mac-security config MAC Address Security: Enabled MAC Address Security SNMP-Locked: Disabled Partition Port on Intrusion Detected: Disabled DA Filtering on Intrusion Detected: Disabled MAC Auto-Learning Age-Time: 60 minutes MAC Auto-Learning Sticky Mode: Disabled Current Learning Mode: Disabled Learn by Ports: NONE Verify the MAC Security Lists Avaya-ERS-Switch# show mac-security security-lists Security List 1: 7-8 Security List 2: 9-10 Security List 3: NONE Security List 4: NONE Security List 5: NONE Security List 6: NONE Security List 7: NONE Security List 8: NONE Security List 9: NONE Security List 10: NONE 50

51 Security List 11: NONE Security List 12: NONE Security List 13: NONE Security List 14: NONE Security List 15: NONE Security List 16: NONE Security List 17: NONE Security List 18: NONE Security List 19: NONE Security List 20: NONE Security List 21: NONE Security List 22: NONE Security List 23: NONE Security List 24: NONE Security List 25: NONE Security List 26: NONE Security List 27: NONE Security List 28: NONE Security List 29: NONE Security List 30: NONE Security List 31: NONE Security List 32: NONE Verify that MAC Security is enabled on the access ports Avaya-ERS-Switch# show mac-security port Port Trunk Security Auto-Learning MAC Number Enabled Disabled 2 2 Enabled Disabled 2 3 Enabled Disabled 2 4 Enabled Disabled 2 5 Enabled Disabled 2 6 Enabled Disabled 2 7 Enabled Disabled 2 8 Enabled Disabled 2 9 Enabled Disabled 2 10 Enabled Disabled 2 51

52 11 Enabled Disabled 2 12 Enabled Disabled 2 13 Enabled Disabled 2 14 Enabled Disabled 2 15 Enabled Disabled 2 16 Enabled Disabled 2 17 Enabled Disabled 2 18 Enabled Disabled 2 19 Enabled Disabled 2 20 Enabled Disabled 2 21 Disabled Disabled 2 22 Disabled Disabled Disabled Disabled Disabled Disabled 2 Verify the authorized MAC addresses appear in the MAC Security MAC table Avaya-ERS-Switch# show mac-security mac-address-table Number of addresses: 2 Unit Port Allowed MAC Address Type Security List Allowed MAC Address Type C0-95-C8-9A-62 Static 1 00-C0-95-C8-FF-12 Static Verify the FDB on the switch Avaya-ERS-Switch# show mac-address-table vid 30 Mac Address Table Aging Time: 300 Learning Enabled Ports 1-26 Number of addresses: 3 MAC Address Vid Type Source C0-95-C8-9A Dynamic Port: 9 52

53 00-C0-95-C8-FF Dynamic Port: 7 00-E E Dynamic Trunk:1 Note From the FDB we can easily see which port has the Active NIC connected Using EDM Initial Switch configuration Create the Security Lists (one for each server) 53

54 Note Up to 32 Security Lists can be created. Globally enable MAC Security 54

55 Enable MAC Security on the access ports Enable traps upon violation 55

56 Provisioning authorized servers Assign authorized MACs to respective security lists 56

57 57

58 Checking MAC Security operational status Verify that MAC Security is globally enabled and on access ports Verify the MAC Security Lists 58

59 Verify the authorized MAC addresses appear in the MAC Security MAC table Note The authorized MACs are shown against both ports in the Security List. Verify the FDB on the switch Note From the FDB we can easily see which port has the Active NIC connected Verifying server connectivity Verify IP connectivity between the Router and the servers Router#% ping ; ping is alive is alive 59

60 3.3.4 Verifying server connectivity after Primary NIC failure Now fail the Active NICs so that the servers start using their backup NICs. Figure 10: Example 3; servers switch over to Backup NIC Verify log file on switch Avaya-ERS-Switch# show log Type Time Idx Src Message I 01:05:41:03 1 Link Down Trap for Port: 7 I 01:05:41:08 2 Link Down Trap for Port: 9 Verify IP connectivity between the Router and the servers Router#% ping ; ping is alive is alive Verify the FDB on the switch Avaya-ERS-Switch#% show mac-address-table vid 30 Mac Address Table Aging Time: 300 Learning Enabled Ports 1-26 Number of addresses: 3 MAC Address Vid Type Source

61 00-C0-95-C8-9A Dynamic Port:10 00-C0-95-C8-FF Dynamic Port: 8 00-E E Dynamic Trunk:1 Note Servers are now using Standby NIC Testing violations Unauthorized device takes server Standby NIC connection Figure 11: Example 3; unauthorized device takes server Standby NIC connection The unauthorized device is not able to send any traffic into the network; however it is still able to see broadcast and unknown traffic flowing in the VLAN; if this is undesired the MAC Security should be configured to partition the port upon an access violation. Verify log file on switch Avaya-ERS-Switch# show log Type Time Idx Src Message I 01:05:54:13 1 Link Down Trap for Port: 8 I 01:05:54:17 2 Link Up Trap for Port: 8 I 01:05:54:21 3 Bay Secure intruder MAC 00-e0-4c port 8 I 01:05:54:21 4 Trap: s5etrnewsbsmacaccessviolation 61

Wake On LAN Technical Configuration Guide. Ethernet Edge Switch NN48500-598 Engineering

Wake On LAN Technical Configuration Guide. Ethernet Edge Switch NN48500-598 Engineering Ethernet Edge Switch NN48500-598 Engineering Wake On LAN Technical Configuration Guide Avaya Data Solutions Document Date: November 2010 Document Number: NN48500-598 Document Version: 1.1 2010 Avaya Inc.

More information

Avaya Identity Engines Ignition Server Release: 8.0 2013 Avaya Inc. All Rights Reserved.

Avaya Identity Engines Ignition Server Release: 8.0 2013 Avaya Inc. All Rights Reserved. / 8.0.1 Ignition Server Release: 8.0 2013 Avaya Inc. All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document is complete and accurate at the

More information

Avaya Identity Engines Ignition Server Getting Started. Avaya Identity Engines Ignition Server Release 7.0

Avaya Identity Engines Ignition Server Getting Started. Avaya Identity Engines Ignition Server Release 7.0 Getting Started Release 7.0 Document Status: Standard Document Number: NN47280-300 (325633-A) Document Version: 02.03 Date: 2010 Avaya Inc. All Rights Reserved. Notices While reasonable efforts have been

More information

IP Office Embedded Voicemail Mailbox User Guide

IP Office Embedded Voicemail Mailbox User Guide Embedded Voicemail Mailbox User Guide 15-604067 Issue 07b - (15 May 2010) 2010 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document

More information

IP Office Release 7.0 IP Office Embedded Voicemail User Guide

IP Office Release 7.0 IP Office Embedded Voicemail User Guide IP Office Embedded Voicemail User Guide 15-604067 Issue 09a - (21 February 2011) 2011 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document

More information

ACD Setup & Operation

ACD Setup & Operation SCS 4.0 ACD Setup & Operation Task Based Guide Copyright 2010 Avaya Inc. All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document is complete

More information

Avaya Visualization Performance and Fault Manager Discovery Best Practices

Avaya Visualization Performance and Fault Manager Discovery Best Practices Avaya Visualization Performance and Fault Manager Discovery Best Practices 2.3 NN48014-105 01.02 June 2011 2011 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure

More information

Router - Network Address Translation (NAT)

Router - Network Address Translation (NAT) BCM50 Rls 6.0 Router - Network Address Translation (NAT) Task Based Guide Copyright 2010 Avaya Inc. All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in

More information

IP Office 8.1 Using Voicemail Pro in Intuity Mode

IP Office 8.1 Using Voicemail Pro in Intuity Mode Using Voicemail Pro in Intuity Mode 15-601066 Issue 13a - (12 June 2012) 2012 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document

More information

Avaya 2033 IP Conference Phone User Guide. Avaya Business Communications Manager

Avaya 2033 IP Conference Phone User Guide. Avaya Business Communications Manager Avaya 2033 IP Conference Phone User Guide Avaya Business Communications Manager Document Status: Standard Document Number: NN40050-102 Document Version: 04.01 Date: May 2010 2010 Avaya Inc. All Rights

More information

BCM Rls 6.0. Remote Access. Task Based Guide

BCM Rls 6.0. Remote Access. Task Based Guide BCM Rls 6.0 Remote Access Task Based Guide Copyright 2010 Avaya Inc. All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document is complete and

More information

IP Office Platform. Avaya IP Office Platform Embedded Voicemail User Guide (IP Office Mode) 15-604067 Issue 15b - (22 January 2015)

IP Office Platform. Avaya IP Office Platform Embedded Voicemail User Guide (IP Office Mode) 15-604067 Issue 15b - (22 January 2015) Avaya Embedded Voicemail User Guide (IP Office Mode) 15-604067 Issue 15b - (22 January 2015) 2015 AVAYA All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information

More information

Using Avaya Aura Messaging

Using Avaya Aura Messaging Using Avaya Aura Messaging 6.0 November 2011 2010 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information in this document is complete and accurate

More information

IP Office. 1403 Phone User Guide. 15-601013 Issue 04a - (16 January 2015)

IP Office. 1403 Phone User Guide. 15-601013 Issue 04a - (16 January 2015) 1403 Phone User Guide 15-601013 Issue 04a - (16 January 2015) 2015 AVAYA All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information in this document is complete

More information

IP Office Avaya Radvision Interoperation Notes

IP Office Avaya Radvision Interoperation Notes Avaya Radvision Interoperation Notes Issue 1d (02 October 2012) 2012 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document is complete

More information

IP Office Essential Edition IP Office Essential Edition - Quick Version Phone Based Administration

IP Office Essential Edition IP Office Essential Edition - Quick Version Phone Based Administration - Quick Version Phone Based Administration - Issue 3d - (31 May 2011) 2011 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document is

More information

Auto Attendant Setup & Operation

Auto Attendant Setup & Operation SCS 4.0 Auto Attendant Setup & Operation Task Based Guide Copyright 2010 Avaya Inc. All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document

More information

> Technical Configuration Guide for Microsoft Network Load Balancing. Ethernet Routing Switch. Virtual Services Platform.

> Technical Configuration Guide for Microsoft Network Load Balancing. Ethernet Routing Switch. Virtual Services Platform. Ethernet Routing Switch Virtual Services Platform Engineering > Technical Configuration Guide for Microsoft Network Load Balancing Avaya Data Solutions Document Date: Document Number: NN48500-593 Document

More information

Avaya Engagement Assistant Web Portal Administration

Avaya Engagement Assistant Web Portal Administration Avaya Engagement Assistant Web Portal Administration Release 3.0 April 2015 2014-2015, Avaya, Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information in

More information

Avaya Microsoft Lync Integration User Guide for IP Office

Avaya Microsoft Lync Integration User Guide for IP Office Avaya Microsoft Lync Integration User Guide for IP Office Release 8.1 02-604138, 01.01 December 2012 2012 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure that the

More information

NN44400-710. Avaya Aura Contact Center Performance Management

NN44400-710. Avaya Aura Contact Center Performance Management Avaya Aura Contact Center Performance Management NN44400-710 Document status: Standard Document issue: 02.03 Document date: 12 November 2010 Product release: Release 6.0/6.1 Job function: Administration

More information

Configuration IP Routing and Multicast Avaya Ethernet Routing Switch 4500 Series

Configuration IP Routing and Multicast Avaya Ethernet Routing Switch 4500 Series Configuration IP Routing and Multicast Avaya Ethernet Routing Switch 4500 Series 5.4 NN47205-506, 02.02 November 2010 2010 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made

More information

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 6.0

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 6.0 Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 6.0 210-100-700 Issue 14 June 2010 2010 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made

More information

IP Office IP Office Softphone Installation

IP Office IP Office Softphone Installation Softphone Installation - Issue 1a - (15 March 2010) 2010 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document is complete and accurate

More information

IP Office Contact Center Contact Recorder Configuration Task Based Guide

IP Office Contact Center Contact Recorder Configuration Task Based Guide IP Office Contact Center Contact Recorder Configuration Task Based Guide Release 9.0.3 Issue 1.01 10 2014 Legal 2014 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure

More information

Using Avaya B189 Conference IP Phone

Using Avaya B189 Conference IP Phone Using Avaya B189 Conference IP Phone Release 1.0 16-604295 Issue 1 January 2014 2013 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information in this

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

BCM Rls 6.0. Feature Codes. Task Based Guide

BCM Rls 6.0. Feature Codes. Task Based Guide BCM Rls 6.0 Feature Codes Task Based Guide Copyright 2010 Avaya Inc. All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document is complete and

More information

Configuration Backup Restore

Configuration Backup Restore Configuration Backup Restore June 2010 2010 Avaya Inc. All Rights Reserved. States and other countries. Adobe and Flash are either trademarks or registered trademarks in the United States and/or other

More information

Avaya Visualization Performance and Fault Manager VPFM SCOM Connector Fundamentals

Avaya Visualization Performance and Fault Manager VPFM SCOM Connector Fundamentals Avaya Visualization Performance and Fault Manager VPFM SCOM Connector Fundamentals Release 3.0.2 NN48014-101 Issue 04.01 March 2013 2013 Avaya Inc. All Rights Reserved. Notice While reasonable efforts

More information

Using Avaya Aura Messaging

Using Avaya Aura Messaging Using Avaya Aura Messaging Release 6.2 Issue 2.1 February 2013 2013 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information in this document is complete

More information

Overview of Avaya Aura System Platform

Overview of Avaya Aura System Platform Overview of Avaya Aura System Platform Release 6.3 Issue 5 June 2015 2015 Avaya Inc. All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document

More information

Accessing and Managing Utility Server

Accessing and Managing Utility Server Accessing and Managing Utility Server Release 6.0 03-603628 Issue 1.0 June 2010 2010 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information in this

More information

Using Avaya Communicator for Microsoft Lync 2010 on IP Office Platform

Using Avaya Communicator for Microsoft Lync 2010 on IP Office Platform Using Avaya Communicator for Microsoft Lync 2010 on IP Office Platform Release 9.1 02-604138 Issue 3 May 2015 2015 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure

More information

IP Office Basic Edition IP Office Basic Edition - Quick Mode Phone Based Administration

IP Office Basic Edition IP Office Basic Edition - Quick Mode Phone Based Administration - Quick Mode Phone Based Administration - Issue 4c - (28 November 2011) 2011 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document is

More information

Initial Installation Single SCS Server

Initial Installation Single SCS Server SCS 4.0 Initial Installation Single SCS Server Task Based Guide Copyright 2010 Avaya Inc. All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document

More information

Configuring and Monitoring Port Security

Configuring and Monitoring Port Security 9 Configuring and Monitoring Port Security Contents Contents....................................................... 9-1 Overview...................................................... 9-2 Basic Operation.............................................

More information

Cisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW)

Cisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW) Page 1 of 20 Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW) Document ID: 50036 Contents Introduction Prerequisites Requirements Components Used Network Diagram The Role of Switched

More information

Software Update Manager User Guide

Software Update Manager User Guide Software Update Manager User Guide October 2011 2011 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information in this document is complete and accurate

More information

> Bring Your Own Device Technical Configuration Guide. Wireless LAN 8100. Identity Engines. Engineering. Avaya Networking Solutions

> Bring Your Own Device Technical Configuration Guide. Wireless LAN 8100. Identity Engines. Engineering. Avaya Networking Solutions Wireless LAN 8100 Identity Engines Engineering > Bring Your Own Device Technical Configuration Guide Avaya Networking Solutions Document Date: April, 2012 Document Number: NN48500-636 Document Version:

More information

Avaya one-x Mobile User Guide for iphone

Avaya one-x Mobile User Guide for iphone Avaya one-x Mobile User Guide for iphone Release 5.2 January 2010 0.3 2009 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in this document was

More information

Monitoring and Analyzing Switch Operation

Monitoring and Analyzing Switch Operation B Monitoring and Analyzing Switch Operation Contents Overview..................................................... B-3....................................... B-4 Menu Access To Status and Counters.........................

More information

Configuration VLANs, Spanning Tree, and Link Aggregation Avaya Ethernet Routing Switch 5000 Series

Configuration VLANs, Spanning Tree, and Link Aggregation Avaya Ethernet Routing Switch 5000 Series Configuration VLANs, Spanning Tree, and Link Aggregation Avaya Ethernet Routing Switch 5000 Series Release 6.2 NN47200-502 Issue 06.03 September 2013 2013 Avaya Inc. All Rights Reserved. Notice While reasonable

More information

Avaya one-x Mobile Preferred for IP Office Administration Guide

Avaya one-x Mobile Preferred for IP Office Administration Guide Avaya one-x Mobile Preferred for IP Office Administration Guide 01.00 October 2011 2011 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information in

More information

Configuring IP Routing and Multicast on Avaya Ethernet Routing Switch 3500 Series

Configuring IP Routing and Multicast on Avaya Ethernet Routing Switch 3500 Series Configuring IP Routing and Multicast on Avaya Ethernet Routing Switch 3500 Series Release 5.2 NN47023-502 Issue 03.01 March 2014 2014 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have

More information

AT-S105 Version 1.2.0 Management Software Release Notes AT-FS750/24POE and AT-FS750/48 Fast Ethernet WebSmart Switches

AT-S105 Version 1.2.0 Management Software Release Notes AT-FS750/24POE and AT-FS750/48 Fast Ethernet WebSmart Switches AT-S105 Version 1.2.0 Management Software Release Notes AT-FS750/24POE and AT-FS750/48 Fast Ethernet WebSmart Switches Please read this document before you begin to use the management software. NOTE This

More information

Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example

Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example Document ID: 69632 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure

More information

> Ignition Server PEAP Active Directory Authentication Technical Configuration Guide. Ignition Server. Engineering. Avaya Data Solutions

> Ignition Server PEAP Active Directory Authentication Technical Configuration Guide. Ignition Server. Engineering. Avaya Data Solutions Ignition Server Engineering > Ignition Server PEAP Active Directory Authentication Technical Configuration Guide Avaya Data Solutions Document Date: Document Number: NN48500-626 Document Version: 1.1 2011

More information

Avaya one-x Mobile User Guide for iphone

Avaya one-x Mobile User Guide for iphone Avaya one-x Mobile User Guide for iphone 18-602788 Issue 1 February 2008 2008 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in this document was

More information

Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved.

Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved. Configuring Single Instance Rapid Spanning Tree Protocol (RSTP) between an Avaya C360 Converged Switch and HP ProCurve Networking Switches to support Avaya IP Telephony Issue 1.0 Abstract These Application

More information

Ethernet Routing Switch 5000 Series Software Release 6.2.8

Ethernet Routing Switch 5000 Series Software Release 6.2.8 Ethernet Routing Switch 5000 Series Software Release 6.2.8 1. Release Summary Release Date: April 21, 2014 Purpose: Software patch release to address customer and internally found software issues. 2. Important

More information

Administering Avaya Video Conferencing Solution Advanced Topics

Administering Avaya Video Conferencing Solution Advanced Topics Administering Avaya Video Conferencing Solution Advanced Topics 04-603308 Issue 1 Release 6.1 April 2012 Contents Chapter 1: Overview of Avaya Video Conferencing Solution....... 9 Components......................................

More information

Avaya 9400 Series Digital Deskphone User Guide for Avaya Aura Communication Manager

Avaya 9400 Series Digital Deskphone User Guide for Avaya Aura Communication Manager Avaya 9400 Series Digital Deskphone User Guide for Avaya Aura Communication Manager 16-603535 Issue 1 August 2011 2011 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to

More information

Deployment Guide: Transparent Mode

Deployment Guide: Transparent Mode Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This

More information

Avaya Aura Contact Center Integration with salesforce.com for Access to Knowledge Management

Avaya Aura Contact Center Integration with salesforce.com for Access to Knowledge Management Avaya Aura Contact Center Integration with salesforce.com for Access to Knowledge Management August 2010 2010 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the

More information

STM Quick Installation Guide

STM Quick Installation Guide www.allo.com Version 2.0 1 Copy Right Copyright 2014 Allo.com. All rights reserved. No part of this publication may be copied, distributed, transmitted, transcribed, stored in a retrieval system, or translated

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Sample Configuration for using Link Layer Discovery Protocol (LLDP) with Cisco Catalyst 4500 or 3750 Switches for VLAN Assignment for Avaya 9600 and 1600 Series

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

1-Port Wireless USB 2.0 Print Server Model # APSUSB201W. Quick Installation Guide. Ver. 2A

1-Port Wireless USB 2.0 Print Server Model # APSUSB201W. Quick Installation Guide. Ver. 2A 1-Port Wireless USB 2.0 Print Server Model # APSUSB201W Quick Installation Guide Ver. 2A Section 1 Step 1Connect one end of the Ethernet cable to the RJ-45 port of the Print Server and attach the other

More information

Avaya CallPilot Fax Set Up and Operation Guide. Avaya Business Communications Manager

Avaya CallPilot Fax Set Up and Operation Guide. Avaya Business Communications Manager Avaya CallPilot Fax Set Up and Operation Guide Avaya Business Communications Manager Document Status: Standard Document Number: NN40080-301 Document Version: 04.02 Date: October 2010 2010 Avaya Inc. All

More information

ProSAFE 8-Port and 16-Port Gigabit Click Switch

ProSAFE 8-Port and 16-Port Gigabit Click Switch ProSAFE 8-Port and 16-Port Gigabit Click Switch Model GSS108E and GSS116E User Manual March 2015 202-11520-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products.

More information

Nokia E90 Communicator Using WLAN

Nokia E90 Communicator Using WLAN Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia

More information

IP Office Basic Edition IP Office Basic Edition - Quick Mode 1400 Series Phone User Guide

IP Office Basic Edition IP Office Basic Edition - Quick Mode 1400 Series Phone User Guide - Quick Mode 1400 Series Phone User Guide - Issue 6b - (23 November 2011) 2011 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document

More information

IP Office Essential Edition IP Office Essential Edition - PARTNER Version 1400 Series Phone User Guide

IP Office Essential Edition IP Office Essential Edition - PARTNER Version 1400 Series Phone User Guide - PARTNER Version 1400 Series Phone User Guide - Issue 5a - (25 October 2011) 2011 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document

More information

Call Detail Recording System Administration Guide. Avaya Business Communications Manager

Call Detail Recording System Administration Guide. Avaya Business Communications Manager Call Detail Recording System Administration Guide Avaya Business Communications Manager Document Status: Standard Document Number: NN420170-605 Document Version: 05.01 Date: May 2010 2010 Avaya Inc. All

More information

IP Configuration Manual

IP Configuration Manual IP Configuration Manual Safety precautions and warnings Thank you for deciding to use a Frama Franking System. The information in this guide is intended to support you during the configuration of the franking

More information

IP Office. T7000 Telephone User Guide. - Issue 02d - (25 June 2014)

IP Office. T7000 Telephone User Guide. - Issue 02d - (25 June 2014) T7000 Telephone User Guide - Issue 02d - (25 June 2014) 2014 AVAYA All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information in this document is complete and accurate

More information

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly

More information

Intel Active Management Technology with System Defense Feature Quick Start Guide

Intel Active Management Technology with System Defense Feature Quick Start Guide Intel Active Management Technology with System Defense Feature Quick Start Guide Introduction...3 Basic Functions... 3 System Requirements... 3 Configuring the Client System...4 Intel Management Engine

More information

Mobility System Software Quick Start Guide

Mobility System Software Quick Start Guide Mobility System Software Quick Start Guide Version 8.0 P/N 530-041387 Rev.05 Table of Contents About this Guide Using the Web Quick Start (WLC2, WLC8, WLC200,WLC800R, and WLC880R) Remotely Configuring

More information

Link Aggregation Interoperability of the Dell PowerConnect 5316M with Cisco IOS or Cisco CatOS based Switches. By Bruce Holmes

Link Aggregation Interoperability of the Dell PowerConnect 5316M with Cisco IOS or Cisco CatOS based Switches. By Bruce Holmes Link Aggregation Interoperability of the Dell PowerConnect 5316M with Cisco IOS or Cisco CatOS based Switches By Bruce Holmes August 2005 Contents Introduction...3 Link Aggregation with Gigabit Ethernet

More information

Back-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13

Back-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13 Back-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13 The information contained in this guide is not of a contractual nature and may be subject to change without prior notice. The software described in this

More information

Watson SHDSL Router Application Manual

Watson SHDSL Router Application Manual Watson SHDSL Router Document Identification Watson-SHDSL-Router-Application-Manual.doc Document Document Revision 2010-03-29 Distribution Customer Watson SHDSL Router Watson-SHDSL-Router-Application-Manual.doc

More information

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive

More information

ProSafe Plus Switch Utility

ProSafe Plus Switch Utility ProSafe Plus Switch Utility User Guide 350 East Plumeria Drive San Jose, CA 95134 USA December 2012 202-10524-05 NETGEAR, Inc. All rights reserved No part of this publication maybe reproduced, transmitted,

More information

Intel Entry Storage System SS4000-E

Intel Entry Storage System SS4000-E Intel Entry Storage System SS4000-E Software Release Notes March, 2006 Storage Systems Technical Marketing Revision History Intel Entry Storage System SS4000-E Revision History Revision Date Number 3 Mar

More information

Ruckus Wireless ZoneDirector Command Line Interface

Ruckus Wireless ZoneDirector Command Line Interface Ruckus Wireless ZoneDirector Command Line Interface Reference Guide Part Number 800-70258-001 Published September 2010 www.ruckuswireless.com Contents About This Guide Document Conventions................................................

More information

Multimedia Traffic Control with IP Multicast (IGMP)

Multimedia Traffic Control with IP Multicast (IGMP) 4 Multimedia Traffic Control with IP Multicast (IGMP) Contents Overview...................................................... 4-3 General Operation and Features.................................. 4-4 IGMP

More information

Configuring the Fabric Interconnects

Configuring the Fabric Interconnects Configuring the Fabric Interconnects This chapter includes the following sections: Initial System Setup, page 1 Performing an Initial System Setup for a Standalone Configuration, page 3 Initial System

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

Data Center Server Access Solution Guide. NN48500-577 Date: July 2010 Version: 1.1

Data Center Server Access Solution Guide. NN48500-577 Date: July 2010 Version: 1.1 Data Center Access Solution Guide NN48500-577 Date: Version: 1.1 2010 Avaya Inc. All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document is

More information

AXIS 205 Network Camera Quick Installation Guide

AXIS 205 Network Camera Quick Installation Guide AXIS 205 Quick Installation Guide Page 1 of 6 AXIS 205 Network Camera Quick Installation Guide Focus Ring Status Indicator (surrounding the focus ring) Serial number Network Indicator Control Button Power

More information

Port Trunking. Contents

Port Trunking. Contents 12 Port Trunking Contents Overview..................................................... 12-2................................... 12-2 Port Connections and Configuration.......................... 12-3 Link

More information

Accessing and Managing Avaya Aura Utility Services

Accessing and Managing Avaya Aura Utility Services Accessing and Managing Avaya Aura Utility Services Release 6.3 03-603628 Issue 3 May 2013 2013 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information

More information

GS510TP and GS110T Gigabit Smart Switches

GS510TP and GS110T Gigabit Smart Switches GS510TP and GS110T Gigabit Smart Switches Software Administration Manual 350 East Plumeria Drive San Jose, CA 95134 USA December 2011 202-10883-01 v1.0 2011 NETGEAR, Inc. All rights reserved No part of

More information

Upgrading to Avaya Aura Experience Portal 7.0.1

Upgrading to Avaya Aura Experience Portal 7.0.1 Upgrading to Avaya Aura Experience Portal 7.0.1 Release 7.0.1 April 2015 2014 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information in this document

More information

Telephone Features User Guide

Telephone Features User Guide Telephone Features User Guide Avaya Business Communications Manager Document Status: Standard Document Version: 02.02 Document Number: NN40170-101 Date: October 2010 2010 Avaya Inc. All Rights Reserved.

More information

Networking Guide Redwood Manager 3.0 August 2013

Networking Guide Redwood Manager 3.0 August 2013 Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...

More information

Wireless Local Area Networks (WLANs)

Wireless Local Area Networks (WLANs) 4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................

More information

AT-S95 Version 1.0.0.35 AT-8000GS Layer 2 Stackable Gigabit Ethernet Switch Software Release Notes

AT-S95 Version 1.0.0.35 AT-8000GS Layer 2 Stackable Gigabit Ethernet Switch Software Release Notes AT-S95 Version 1.0.0.35 AT-8000GS Layer 2 Stackable Gigabit Ethernet Switch Software Release Notes Please read this document before you begin to use the management software. Supported Platforms The following

More information

ProSafe Plus Switch Utility

ProSafe Plus Switch Utility ProSafe Plus Switch Utility User Guide 350 East Plumeria Drive San Jose, CA 95134 USA September 2010 202-10524-03 v1.0 ProSafe Plus Switch Utility User Guide 2010 NETGEAR, Inc. All rights reserved. No

More information

TotalCloud Phone System

TotalCloud Phone System TotalCloud Phone System Cisco SF 302-08P PoE VLAN Configuration Guide Note: The below information and configuration is for deployment of the Cbeyond managed switch solution using the Cisco 302 8 port Power

More information

How To Use An Ip Office Over An Libresearcher Over An Safv Service On An Iphone Or Ip Office On A Pc Or Ipo On A Network On A Server On A Microsoft Ip Office Vpn On A P

How To Use An Ip Office Over An Libresearcher Over An Safv Service On An Iphone Or Ip Office On A Pc Or Ipo On A Network On A Server On A Microsoft Ip Office Vpn On A P Avaya IP Office SSL VPN Solutions Guide Release 9.0 Issue 02.01 September 2013 2013 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information in this

More information

Avaya Configuration and Orchestration Manager Administration

Avaya Configuration and Orchestration Manager Administration Avaya Configuration and Orchestration Manager Administration Release 3.0.1 NN47226-600 Issue 07.01 January 2013 2013 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure

More information

A Guide to Simple IP Camera Deployment Using ZyXEL Bandwidth Solutions

A Guide to Simple IP Camera Deployment Using ZyXEL Bandwidth Solutions A Guide to Simple IP Camera Deployment Using ZyXEL Bandwidth Solutions 2015/7/22 ZyXEL Communications Corporation Barney Gregorio Overview: This article contains guidelines on how to introduce IP cameras

More information

HP Virtual Connect Ethernet Cookbook: Single and Multi Enclosure Domain (Stacked) Scenarios

HP Virtual Connect Ethernet Cookbook: Single and Multi Enclosure Domain (Stacked) Scenarios HP Virtual Connect Ethernet Cookbook: Single and Multi Enclosure Domain (Stacked) Scenarios Part number 603028-003 Third edition August 2010 Copyright 2009,2010 Hewlett-Packard Development Company, L.P.

More information

Configuring Port Security

Configuring Port Security CHAPTER 62 This chapter describes how to configure the port security feature. For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Master List, at this URL:

More information

SuperLumin Nemesis. Administration Guide. February 2011

SuperLumin Nemesis. Administration Guide. February 2011 SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Configuring NETGEAR PROSAFE 8-port, 16-port and 24-port switches Supporting Power over Ethernet with Avaya Communication Manager, Avaya one-x Quick Edition G10

More information

Management Software. User s Guide AT-S84. For the AT-9000/24 Layer 2 Gigabit Ethernet Switch. Version 1.1. 613-000368 Rev. B

Management Software. User s Guide AT-S84. For the AT-9000/24 Layer 2 Gigabit Ethernet Switch. Version 1.1. 613-000368 Rev. B Management Software AT-S84 User s Guide For the AT-9000/24 Layer 2 Gigabit Ethernet Switch Version 1.1 613-000368 Rev. B Copyright 2006 Allied Telesyn, Inc. All rights reserved. No part of this publication

More information